INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME-3,
ISSUE-3)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Analyzing Security and Performance Issue on Enterprise Data |
IJRECS/V-3/I-3/01 |
|
ManeendraYarru, Naga Mallik Accha |
2. |
Identity Based Encryption Using Secure Brokerless Publisher Subscriber Model |
IJRECS/V-3/I-3/02 |
|
D. Saikumar, T. Venkat Narayana Rao |
3. |
Comparison of Image Denoising Techniques in the Wavelet Domain |
IJRECS/V-3/I-3/03 |
|
Veesari Mounika, Ayesha Tarannum, D. Vijay Kumar |
4. |
Proximity Malware Identification in IP- Based Wi-Fi Connections |
IJRECS/V-3/I-3/04 |
|
Aruna Peddi, M. Sreelatha |
5. |
Access Control of Data Sharing in Cloud Computing by using Cryptosystems |
IJRECS/V-3/I-3/05 |
|
Kanneganti Priyanka, B. Tirupathi Kumar |
6. |
Efficient and Multi-hop Cost-Effective Resource in the Overlay Routing Networks |
IJRECS/V-3/I-3/06 |
|
P. Nagendra, P. Srinivas |
7. |
Efficient Multi-Keyword Ranked Search for Retrieving the Encrypted Cloud Data |
IJRECS/V-3/I-3/07 |
|
Ch. Aruna Reddy, K. Tulasi |
8. |
Performance Analysis of Novel Encryption for Public Cloud Databases |
IJRECS/V-3/I-3/08 |
|
Mandru Praveen Raju, Thurimella Srikanth |
9. |
Shortest Path Computing by using Effective Indexing and Query Optimization Mechanism |
IJRECS/V-3/I-3/09 |
|
Lakavath Anil Kumar, M. Swetha |
10. |
Transient Steadiness of an Altered Rate Wind Farms to Weak Grid Connection Using UPQC |
IJRECS/V-3/I-3/10 |
|
Shaik Sarfaraj Ahammed, Boggavarapu Ramesh, Yerramsetty Pavani |
11. |
Adaptability and Integrity Attestation System Security Frameworks for Software-As-A-Service |
IJRECS/V-3/I-3/11 |
|
P. Shivaranjani, R. Kavitha |
12. |
Maintaining Secrecy Transmission of Data in Wireless Sensor Networks Using Elliptical Curve Cryptography |
IJRECS/V-3/I-3/12 |
|
Mallela Gopal, G. Uday Kumar |
13. |
Implementation of Cloud Predicted Distributed Access Control with In-Nominate Authentication |
IJRECS/V-3/I-3/13 |
|
B. Vinayteja, K. Vinay Kumar Reddy |
14. |
Detection of Denial of Service Attack in a System Using Multivariate Correlation Analysis |
IJRECS/V-3/I-3/14 |
|
M. Niharika, U. Sivaji |
15. |
Automated API Property Inference Techniques |
IJRECS/V-3/I-3/15 |
|
Udaya Bhasker Sivakoti, Dr. R. China Appala Naidu |
16. |
Altering Secrecy in Infrastructures of Content Based Publish/Subscribe |
IJRECS/V-3/I-3/16 |
|
P. Shirisha, K. C. Ravi Kumar |
17. |
Finding Emerging Topics in Social Streams by means of Link-Anomaly Detection |
IJRECS/V-3/I-3/17 |
|
Mehjabeen Sultana, Sara Ali, Saleha Farha |
18. |
Preventing Privacy Attribute-Based Signature in Cloud Computing |
IJRECS/V-3/I-3/18 |
|
G. Krishna Chaitanya, Ch. Srinath Reddy |
19. |
ESMC Cloud: The Framework of Efficient Video Sharing and Adaptive Mobile Video Codec in the Clouds |
IJRECS/V-3/I-3/19 |
|
K. Bramham, K. Prathibha |
20. |
Optimal Distributed Malware Selection for Heterogeneous Mobile Ad-Hoc Dissemination |
IJRECS/V-3/I-3/20 |
|
Ganuga Mahaboob Basha, Narra Sukhender Reddy |
21. |
Evaluating Cost and Performance Metrics of Adaptive Encryption Architecture for Cloud Databases |
IJRECS/V-3/I-3/21 |
|
Sushma Dachavaram, M. Sreelatha, Tirupathi Durgam |
22. |
Decentralized Disruption Tolerant Military Networks Using Attribute Based Secure Data Access Scheme |
IJRECS/V-3/I-3/22 |
|
Palsa Muthyalu, Dr. S. Krishna Mohan Rao |
23. |
Efficient Method for Finding a Friend in Social Networks and Filtering of Unwanted Messages in User Wall |
IJRECS/V-3/I-3/23 |
|
Kumbham Venu, S. Sudha Rani |